General

  • Target

    8d26ad6421d84b4d824b1f31e33f9cf878e14e4a06da9e404230bbbee07286e9

  • Size

    6.0MB

  • Sample

    220708-kmyhrabhb6

  • MD5

    bb0296a088bb59beb5a1036deaf7fdd9

  • SHA1

    9d21aeeb734f80d302c82098a3033463842ebb1f

  • SHA256

    8d26ad6421d84b4d824b1f31e33f9cf878e14e4a06da9e404230bbbee07286e9

  • SHA512

    1bb684a262198a033f06d45d6712a89a2783644783947febe9e1a9b77c1577249c4691bc256c4a975b498c650efd5bf1e0016f2a354f8a3939d33168df72f671

Malware Config

Targets

    • Target

      8d26ad6421d84b4d824b1f31e33f9cf878e14e4a06da9e404230bbbee07286e9

    • Size

      6.0MB

    • MD5

      bb0296a088bb59beb5a1036deaf7fdd9

    • SHA1

      9d21aeeb734f80d302c82098a3033463842ebb1f

    • SHA256

      8d26ad6421d84b4d824b1f31e33f9cf878e14e4a06da9e404230bbbee07286e9

    • SHA512

      1bb684a262198a033f06d45d6712a89a2783644783947febe9e1a9b77c1577249c4691bc256c4a975b498c650efd5bf1e0016f2a354f8a3939d33168df72f671

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks